Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Networks"
DOI: 10.1007/s11276-019-01984-x
Abstract: Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined…
read more here.
Keywords:
policy based;
collaborative policy;
based security;
security scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08729-0
Abstract: In recent times, wireless communication systems have been considered by a fixed spectrum allocation policy, where administrative agencies provide wireless spectrum to licensees on a long-term basis for high geographical areas. Cognitive radio networks (CRN)…
read more here.
Keywords:
blockchain based;
based security;
spectrum;
network ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Sustainable Cities and Society"
DOI: 10.1016/j.scs.2021.102994
Abstract: Abstract While there has been a significant interest in understanding the cyber threat landscape of Internet of Things (IoT) networks, and the design of Artificial Intelligence (AI)-based security approaches, there is a lack of distributed…
read more here.
Keywords:
based security;
architecture;
iot;
network ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Nanoscale"
DOI: 10.1039/c7nr06337g
Abstract: Herein, we present the first example of a silicon nanoshuttle-based security ink simultaneously featuring attractive optical and magnetic properties, suitable for fluorescent and magnetic anti-counterfeiting and encryption. Significantly, the information can be dual-encrypted through multi-color…
read more here.
Keywords:
security ink;
anti counterfeiting;
nanoshuttle based;
based security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IETE Journal of Research"
DOI: 10.1080/03772063.2018.1486740
Abstract: ABSTRACT Cloud computing is a new computing paradigm which is gaining wide acceptance among scientific fraternity in the recent years. The services of cloud could be effectively used for running large-scale data and computation-intensive scientific…
read more here.
Keywords:
schedule;
cloud computing;
fuzzy based;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3078072
Abstract: This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT). We start by summarizing the existing surveys that deal with blockchain security…
read more here.
Keywords:
blockchain based;
privacy systems;
based security;
security privacy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v14.i3.pp1395-1404
Abstract: The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development…
read more here.
Keywords:
trust;
based security;
review;
trust based ... See more keywords